Get Involved
Query: List inactive tokens
Description
Discover the segments that contain inactive tokens to help maintain system security by ensuring outdated or unused tokens are identified and managed appropriately. This can be particularly useful in preventing unauthorized access or detecting potential system vulnerabilities.
Query
Tables used in this query: